Volume 7, Number 1 (March 2016) BibTex
- pp. 1-22 (DOI:10.22667/JOWUA.2016.03.31.001)
- A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers
- pp. 23-38 (DOI:10.22667/JOWUA.2016.03.31.023)
- Optimal Relay Node Selection in Two-Hop Routing for Intermittently Connected MANETs
- pp. 39-57 (DOI:10.22667/JOWUA.2016.03.31.039)
- Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices
Chika Eze, Jason R. C. Nurse, and Jassim Happa [Abstract] - pp. 58-78 (DOI:10.22667/JOWUA.2016.03.31.058) Technique of Data Visualization: Example of Network Topology Display for Security Monitoring
- pp. 79-96 (DOI:10.22667/JOWUA.2016.03.31.079) A Systematic Approach for Attack Analysis and Mitigation in V2V Networks
- pp. 97-117 (DOI:10.22667/JOWUA.2016.03.31.097)
Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based Model
William Casey, Jose Andre Morales, and Bud Mishra
[Abstract]
[Abstract]
[Abstract]
Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, and Igor Kotenko
[Abstract]
Bharat Bhargava, Amber M. Johnson, Gisele Izera Munyengabe, and Pelin Angin
[Abstract]